problem 2) Which two of the following are true regarding distance-vector and link-state routing protocols?

a. Link state sends its whole routing table out all active interfaces on periodic time intervals.b. Distance vector sends its whole routing table out all active interfaces on periodic time intervals.c. Link state sends updates containing the state of its own links to all routers in the internetwork.d. Distance vector sends updates containing the state of its own links to all routers in internetwork.

A. 1 onlyB. 3 onlyC. 2 and 3 onlyD. None of the above

problem 3) IGRP uses which of the following as default parameters for finding the best path to remote network?

problem 4) Network 206.143.5.0 was assigned to Acme Company to connect to its ISP. The administrator of Acme will like to configure one router with commands to access the Internet. Which commands can be configured on the Gateway router to permit Internet access to the entire network?

problem 5) What is the function of Spanning Tree Protocol in a switched LAN?

A. To provide the mechanism for network monitoring in switched environmentsB. To prevent routing loops in networks with redundant pathsC. To prevent switching loops in networks with redundant switched pathsD. To manage VLAN database across multiple switchesE. To create collision domains

problem 6) Which statement describe a spanning-tree network that has converged?

A. All switch and bridge ports are in forwarding state.B. All switch and bridge ports are assigned as either root or designated ports.C. All switch and bridge ports are in either the forwarding or blocking state.D. All switch and bridge ports are either blocking or looping.

problem 7) What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A. Forwards the switch to the first available linkB. Drops the frameC. Floods the network with the frame looking for the deviceD. Sends back a message to the originating station asking for a name resolution

problem 8) In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the switched LAN?

A. During high-traffic periodsB. After broken links are reestablishedC. When upper-layer protocols require high reliabilityD. In the improperly implemented redundant topology

Related Questions in Computer Network & Security

Question 1: Explain about Snort Rules, create rules and test the created rules. Question 2: Kerberos Authentication Protocol You are required to do personal research to complete the following questions regarding this top ...

You are a senior technology analyst for an IT support company of approximately 30 employees. Your company assists small business in selecting, implementing, enhancing and managing their IT infrastructure. Most of your cu ...

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world? Make sure you include the following: 1. Include a summary paragraph/abstract at the beginni ...

Term Paper: Security Regulation Compliance This assignment consists of two sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. L ...

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, it was asked, has everything been done that is possib ...

Assignment Submission Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1 -Cryptographic Operations with GPG Objective: gain experience ...

Problem 1: Consider the following protocol. There exists a trusted server, T, that shares a secret key with any participant in the network. That is, for a participant A, A and T share a secret key K A . The protocol allo ...

Explain briefly what is meant by ‘optimising a network'. Answer should refer to all aspects of optimisation, including resource smoothing /levelling, crashing the network, and anything else you consider relevant.

4,153,160 Questions Asked

13,132 Experts

2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses,
Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.